Heimdal
Latest Articles

Search Results:

Here are the guides and articles we found according to your search.

2681 results for ""

News | QUICK READ

11 Million Patients` Data Stolen in HCA Healthcare Data Breach

The Attack Affected 1,038 Hospitals and Physician Clinics Across 20 States.

News | QUICK READ

EU Healthcare: ENISA Reports that 54% of Cyber Threats Are Ransomware

The Report Identifies the Top Healthcare Cyber Threats Over the Past Two Years.

News | QUICK READ

Deutsche Bank, ING, and Postbank Customers` Data Exposed in Breach

The Banks Shared the Same Third-Party Vendor Who Was Victim of MOVEit Hacks.

News | QUICK READ

Zero-day Alert! Microsoft Unpatched Vulnerability Exploited in NATO Summit Attacks

CVE-2023-36884 Enables Remote Code Execution over Malicious Office Documents.

News | QUICK READ

A New Banking Trojan on the Rise: TOITOIN Banking Trojan

TOITOIN Targets Businesses in Latin America (LATAM).

News | QUICK READ

New Ransomware Strain Discovered: Big Head

The New Big Head Ransomware Uses Bogus Windows Update Alert.

Cybersecurity Basics | QUICK READ

What Is Vendor Risk Management (VRM)?

Definition, Key Indicators, Responsible Parties, and the Role of Cybersecurity Defenses.

News | QUICK READ

StackRot: A New Linux Kernel Flaw Allows Privilege Escalation

The Vulnerability Is Impacting Linux Version 6.1 Through 6.4.

News | INTERMEDIATE READ

Top Data Breaches in 2023: Alarming Incidents Impacting Companies

A Recap of Data Breaches in the First Half of 2023.

News | QUICK READ

CISA, FBI: A New Version of the Truebot Malware Is Actively Used in Attacks

The Malware Is Used to Exploit an RCE Vulnerability Found in Netwrix Auditor.

News | QUICK READ

RedEnergy Stealer Ransomware: A New Threat Targeting Critical Infrastructure

RedEnergy Stealer Fits into the Hybrid Stealer-as-a-Ransomware Threat Category.

News | INTERMEDIATE READ

Linux Ransomware Exposed: Not Just a Windows Problem Anymore

Exploring Linux Ransomware, Real-Life Examples, and Proactive Defense Measures.

Access Management | QUICK READ

Internal Threats: A Major Risk to Any Business

Do You Know How to Mitigate Internal Threats?

News | INTERMEDIATE READ

What Is Passwordless Authentication?

And How It Can Benefit Your Organization.

News | QUICK READ

CISA Warning! 8 Actively Exploited Flaws in Samsung and D-Link Devices

FCEB Agencies Are Required to Patch by July 20th.

News | QUICK READ

Charming Kitten’s POWERSTAR Malware Boosts its Techniques

New Capabilities Include the Ability to Execute PowerShell, CSharp Commands, and More.

News | QUICK READ

Massive Data Breach Affects UK Hospital Group

Threat Actors Claim “More Bigger Leak From The Health Care System In UK”.

News | QUICK READ

BlackCat Ransomware Gang to Launch Malicious WinSCP Ads

The Malvertising Campaign Pushes Cobalt Strike Malware.

Cybersecurity Basics | INTERMEDIATE READ

What Is a Managed Security Service Provider (MSSP)?

Learn How MSSPs Can Help Strengthen Your Cybersecurity Posture.

News | QUICK READ

New Malware Alert: EarlyRAT Linked to North Korean Hacking Group

The Newly Discovered Malware Is Believed to be Used by a Sub-group of Lazarus.

News | QUICK READ

New Proxyjacking Campaign: Cybercriminals Hijack Vulnerable SSH Servers

Security Researchers Warn About the Dangers Posed By Proxyjacking.

News | QUICK READ

8Base Ransomware Emerges from the Shadows

The Spike in 8Base Ransomware Activity Threatens U.S. and Brazilian Companies.

News | QUICK READ

Hackers Use PindOS Javascript Dropper to Deploy Bumblebee, IcedID Malware

Custom-made Malware Samples Can Evade Signature-based Detection Tools.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats